unexpected length.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
To fix this issue, it's suggested to update libmodbus to v3.1.11
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4084-1 | libmodbus security update |
EUVD |
EUVD-2024-53894 | Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length. |
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 29 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libmodbus
Libmodbus libmodbus |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:libmodbus:libmodbus:3.1.10:*:*:*:*:*:*:* | |
| Vendors & Products |
Libmodbus
Libmodbus libmodbus |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 27 Feb 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length. | |
| Title | Stack-based Buffer Overflow in libmodbus library | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-11-03T20:36:25.510Z
Reserved: 2024-11-06T09:29:36.151Z
Link: CVE-2024-10918
Updated: 2025-11-03T20:36:25.510Z
Status : Modified
Published: 2025-02-27T12:15:33.807
Modified: 2025-11-03T21:16:04.100
Link: CVE-2024-10918
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD